Learn More
Wireless sensor networks (WSNs) have been broadly studied with advances in ubiquitous computing environment. Because the resource of a sensor node is limited, it is important to use energy-efficient routing protocol in WSNs. The cluster-based routing is an efficient way to reduce energy consumption by decreasing the number of transmitted messages to the(More)
Recent development in wireless communication technology and mobile equipment like PDA, cellular phone and GPS is making location-based services (LBSs) more popular day by day. However, because, in the LBSs, users continuously send queries to LBS servers by using their exact locations, private information could be in danger. Therefore, a mechanism for users'(More)
Prediction of travel time has major concern in the research domain of Intelligent Transportation Systems (ITS). Clustering strategy can be used as a powerful tool of discovering hidden knowledge that can easily be applied on historical traffic data to predict accurate travel time. In our Modified K-means Clustering (MKC) approach, a set of historical data(More)
Travel time prediction is an indispensable for numerous intelligent transportation systems (ITS) including advanced traveler information systems. The main purpose of this research is to develop a dynamic travel time prediction model for road networks. In this study we proposed a new method to predict travel times using Artificial Neural Network model(More)
In this paper, we design a context-aware architecture for dealing with intelligent application services in ubiquitous computing. The context-aware architecture is composed of middleware, context server, and client. The middleware component of our context-aware architecture plays an important role in recognizing a moving node with mobility by using a(More)
Due to the advancement of wireless internet and mobile positioning technology, the application of location-based services (LBSs) has become popular for mobile users. Since users have to send their exact locations to obtain the service, it may lead to several privacy threats. To solve this problem, a cloaking method has been proposed to blur users’ exact(More)